Explain how a shared region could be used for a process to read data written by the kernel. Include
in your explanation what would be necessary for synchronization.

What will be an ideal response?


The shared region is mapped read-only into the process’s address space, but is writable by the kernel.The
process reads data from the region using standard LOAD instructions (avoiding a TRAP). The process may
poll the data in the region from time to time to see if it has changed. However, we may require a way for the
kernel to notify the process when it has written new data. A software interrupt can be used for this purpose.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A weakness of the IDES approach is its lack of flexibility. ?? 2. To be of practical use an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. ? 3. ? System administrators can stop all attacks and hackers from penetrating their systems by installing software patches periodically. ? 4. Password crackers rely on the fact that some people choose easily guessable passwords. ?? 5. ?Traditional hackers usually have specific targets, or at least classes of targets in mind. ?

Computer Science & Information Technology

?Which of the following steps is the first step in goals-based strategic planning?

A. Define strategies B. ?Set direction C. ?Deploy plan D. ?Analyze situation

Computer Science & Information Technology

Use one statement to assign the sum of x and y to z, then increment x by 1.

Write Java statements to accomplish each of the tasks.

Computer Science & Information Technology

Security settings may be changed in the browser to allow you to view

A) dynamic content B) active content C) interactive content D) static content

Computer Science & Information Technology